default search action
Mohammad Maifi Hasan Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Md Abdullah Al Fahim, Mohammad Maifi Hasan Khan, Theodore Jensen, Yusuf Albayram:
Human vs. Automation: Which One Will You Trust More If You Are About to Lose Money? Int. J. Hum. Comput. Interact. 39(12): 2420-2435 (2023) - [j15]Md Abdullah Al Fahim, Mohammad Maifi Hasan Khan, Theodore Jensen, Yusuf Albayram, Emil Coman, Ross Buck:
The Mediating Effect of Emotions on Trust in the Context of Automated System Usage. IEEE Trans. Affect. Comput. 14(2): 1572-1585 (2023) - [c42]Ehsan Ul Haque, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim:
The Nuanced Nature of Trust and Privacy Control Adoption in the Context of Google. CHI 2023: 591:1-591:23 - [c41]Ehsan Ul Haque, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Theodore Jensen:
Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication. EuroUSEC 2023: 27-47 - [c40]Ehsan Ul Haque, Mohammad Maifi Hasan Khan:
Effect of Device Risk Perceptions and Understandability of Data Management Features on Consumers' Willingness to Pay (WTP) for IoT Device Premium Data Management Plan. EuroUSEC 2023: 68-85 - 2022
- [c39]Theodore Jensen, Mohammad Maifi Hasan Khan:
I'm Only Human: The Effects of Trust Dampening by Anthropomorphic Agents. HCI (43) 2022: 285-306 - 2021
- [c38]Theodore Jensen, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Yusuf Albayram:
Trust and Anthropomorphism in Tandem: The Interrelated Nature of Automated Agent Appearance and Reliability in Trustworthiness Perceptions. Conference on Designing Interactive Systems 2021: 1470-1480 - [c37]Md Abdullah Al Fahim, Mohammad Maifi Hasan Khan, Theodore Jensen, Yusuf Albayram, Emil Coman:
Do Integral Emotions Affect Trust? The Mediating Effect of Emotions on Trust in the Context of Human-Agent Interaction. Conference on Designing Interactive Systems 2021: 1492-1503 - 2020
- [j14]Theodore Jensen, Mohammad Maifi Hasan Khan, Yusuf Albayram, Md Abdullah Al Fahim, Ross Buck, Emil Coman:
Anticipated Emotions in Initial Trust Evaluations of a Drone System Based on Performance and Process Information. Int. J. Hum. Comput. Interact. 36(4): 316-325 (2020) - [c36]Sarah Marie Peck, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Emil N. Coman, Theodore Jensen, Yusuf Albayram:
Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA. COMPSAC 2020: 778-789 - [c35]Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen:
A Dynamic Resource Allocation Framework for Apache Spark Applications. COMPSAC 2020: 997-1004 - [c34]Yusuf Albayram, Theodore Jensen, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Ross Buck, Emil Coman:
Investigating the Effects of (Empty) Promises on Human-Automation Interaction and Trust Repair. HAI 2020: 6-14 - [c33]Theodore Jensen, Mohammad Maifi Hasan Khan, Yusuf Albayram:
The Role of Behavioral Anthropomorphism in Human-Automation Trust Calibration. HCI (37) 2020: 33-53
2010 – 2019
- 2019
- [j13]Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen, Swapna S. Gokhale:
Design and implementation of an analytical framework for interference aware job scheduling on Apache Spark platform. Clust. Comput. 22(Suppl 1): 2223-2237 (2019) - [j12]Yusuf Albayram, Theodore Jensen, Mohammad Maifi Hasan Khan, Ross Buck, Emil Coman:
Investigating the Effect of System Reliability, Risk, and Role on Users' Emotions and Attitudes toward a Safety-Critical Drone System. Int. J. Hum. Comput. Interact. 35(9): 761-772 (2019) - [c32]Theodore Jensen, Yusuf Albayram, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Ross Buck, Emil Coman:
The Apple Does Fall Far from the Tree: User Separation of a System from its Developers in Human-Automation Trust Repair. Conference on Designing Interactive Systems 2019: 1071-1082 - [c31]Md Abdullah Al Fahim, Mohammad Maifi Hasan Khan, Theodore Jensen, Yusuf Albayram, Emil Coman, Ross Buck:
Effect of Feedback on Users' Immediate Emotions: Analysis of Facial Expressions during a Simulated Target Detection Task. ICMI 2019: 49-58 - [c30]Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen, Swapna S. Gokhale:
A Model Driven Approach Towards Improving the Performance of Apache Spark Applications. ISPASS 2019: 233-242 - 2018
- [j11]Ross Buck, Mohammad Maifi Hasan Khan, Michael Fagan, Emil Coman:
The User Affective Experience Scale: A Measure of Emotions Anticipated in Response to Pop-Up Computer Warnings. Int. J. Hum. Comput. Interact. 34(1): 25-34 (2018) - [j10]Michael Fagan, Mohammad Maifi Hasan Khan:
To Follow or Not to Follow: A Study of User Motivations around Cybersecurity Advice. IEEE Internet Comput. 22(5): 25-34 (2018) - [c29]Nhan Nguyen, Mohammad Maifi Hasan Khan, Kewen Wang:
Towards Automatic Tuning of Apache Spark Configuration. IEEE CLOUD 2018: 417-425 - [c28]Theodore Jensen, Yusuf Albayram, Mohammad Maifi Hasan Khan, Ross Buck, Emil Coman, Md Abdullah Al Fahim:
Initial Trustworthiness Perceptions of a Drone System based on Performance and Process Information. HAI 2018: 229-237 - [c27]Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Ross Buck, Emil Coman:
The Effects of Risk and Role on Users' Anticipated Emotions in Safety-Critical Systems. HCI (6) 2018: 369-388 - 2017
- [j9]Michael Fagan, Yusuf Albayram, Mohammad Maifi Hasan Khan, Ross Buck:
An investigation into users' considerations towards using password managers. Hum. centric Comput. Inf. Sci. 7: 12 (2017) - [j8]Yusuf Albayram, Mohammad Maifi Hasan Khan, Michael Fagan:
A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA). Int. J. Hum. Comput. Interact. 33(11): 927-942 (2017) - [c26]Nhan Nguyen, Mohammad Maifi Hasan Khan, Yusuf Albayram, Kewen Wang, Swapna S. Gokhale:
Arion: A Model-Driven Middleware for Minimizing Data Loss in Stream Data Storage. CLOUD 2017: 34-41 - [c25]Nhan Nguyen, Mohammad Maifi Hasan Khan, Yusuf Albayram, Kewen Wang:
Understanding the Influence of Configuration Settings: An Execution Model-Driven Framework for Apache Spark Platform. CLOUD 2017: 802-807 - [c24]Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen:
"...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. SOUPS 2017: 49-63 - 2016
- [j7]Yusuf Albayram, Mohammad Maifi Hasan Khan:
Evaluating smartphone-based dynamic security questions for fallback authentication: a field study. Hum. centric Comput. Inf. Sci. 6: 16 (2016) - [c23]Kewen Wang, Mohammad Maifi Hasan Khan, Nhan Nguyen, Swapna S. Gokhale:
Modeling Interference for Apache Spark Jobs. CLOUD 2016: 423-431 - [c22]Nhan Nguyen, Mohammad Maifi Hasan Khan, Kewen Wang:
CSMiner: An Automated Tool for Analyzing Changes in Configuration Settings across Multiple Versions of Large Scale Cloud Software. CLOUD 2016: 472-480 - [c21]Michael Fagan, Mohammad Maifi Hasan Khan:
Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice. SOUPS 2016: 59-75 - 2015
- [j6]Michael Fagan, Mohammad Maifi Hasan Khan, Ross Buck:
A study of users' experiences and beliefs about software update messages. Comput. Hum. Behav. 51: 504-519 (2015) - [j5]Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotirios Kentros, Nhan Nguyen, Ruhua Jiang:
Designing challenge questions for location-based authentication systems: a real-life study. Hum. centric Comput. Inf. Sci. 5: 17 (2015) - [j4]Michael Fagan, Mohammad Maifi Hasan Khan, Nhan Nguyen:
How does this message make you feel? A study of user perspectives on software update/warning message design. Hum. centric Comput. Inf. Sci. 5: 36 (2015) - [j3]Nhan Nguyen, Mohammad Maifi Hasan Khan:
A closed-loop context aware data acquisition and resource allocation framework for dynamic data driven applications systems (DDDAS) on the cloud. J. Syst. Softw. 109: 88-105 (2015) - [j2]Yong Yang, Lu Su, Mohammad Maifi Hasan Khan, Michael LeMay, Tarek F. Abdelzaher, Jiawei Han:
Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems. ACM Trans. Sens. Networks 11(2): 33:1-33:33 (2015) - [c20]Kewen Wang, Mohammad Maifi Hasan Khan:
Performance Prediction for Apache Spark Platform. HPCC/CSS/ICESS 2015: 166-173 - [c19]Yusuf Albayram, Mohammad Maifi Hasan Khan:
Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study. SOUPS 2015: 211-224 - 2014
- [j1]Mohammad Maifi Hasan Khan, Hieu Khac Le, Hossein Ahmadi, Tarek F. Abdelzaher, Jiawei Han:
Troubleshooting interactive complexity bugs in wireless sensor networks using data mining techniques. ACM Trans. Sens. Networks 10(2): 31:1-31:35 (2014) - [c18]Yusuf Albayram, Mohammad Maifi Hasan Khan, Athanasios Bamis, Sotiris Kentros, Nhan Nguyen, Ruhua Jiang:
A Location-Based Authentication System Leveraging Smartphones. MDM (1) 2014: 83-88 - 2013
- [c17]Nhan Nguyen, Mohammad Maifi Hasan Khan:
Performance analysis of a fault-tolerant exact motif mining algorithm on the cloud. IPCCC 2013: 1-9 - [c16]Nhan Nguyen, Mohammad Maifi Hasan Khan:
Context Aware Data Acquisition Framework for Dynamic Data Driven Applications Systems (DDDAS). MILCOM 2013: 334-341 - 2012
- [c15]Michael Fagan, Mohammad Maifi Hasan Khan, Bing Wang:
Leveraging Cloud Infrastructure for Troubleshooting Edge Computing Systems. ICPADS 2012: 440-447 - 2011
- [b1]Mohammad Maifi Hasan Khan:
Troubleshooting interactive complexity bugs. University of Illinois Urbana-Champaign, USA, 2011 - [c14]Mohammad Maifi Hasan Khan, Jin Heo, Shen Li, Tarek F. Abdelzaher:
Understanding Vicious Cycles in Server Clusters. ICDCS 2011: 645-654 - [c13]Eunsoo Seo, Mohammad Maifi Hasan Khan, Prasant Mohapatra, Jiawei Han, Tarek F. Abdelzaher:
Exposing Complex Bug-Triggering Conditions in Distributed Systems via Graph Mining. ICPP 2011: 186-195 - [c12]Mohammad Maifi Hasan Khan, Hossein Ahmadi, Gulustan Dogan, Kannan Govindan, Raghu K. Ganti, Theodore Brown, Jiawei Han, Prasant Mohapatra, Tarek F. Abdelzaher:
DustDoctor: A self-healing sensor data collection system. IPSN 2011: 127-128 - [c11]Yong Yang, Lu Su, Mohammad Maifi Hasan Khan, Michael LeMay, Tarek F. Abdelzaher, Jiawei Han:
Power watermarking: Facilitating power-based diagnosis of node silence in remote high-end sensing systems. IPSN 2011: 159-160 - [c10]Kannan Govindan, Xinlei Wang, Mohammad Maifi Hasan Khan, Gulustan Dogan, Kai Zeng, Gerald M. Powell, Ted Brown, Tarek F. Abdelzaher, Prasant Mohapatra:
PRONET: Network trust assessment based on incomplete provenance. MILCOM 2011: 1213-1218 - [c9]Gulustan Dogan, Theodore Brown, Kannan Govindan, Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Prasant Mohapatra, Jin-Hee Cho:
Evaluation of network trust using provenance based on distributed local intelligence. MILCOM 2011: 1493-1498 - 2010
- [c8]Mohammad Maifi Hasan Khan, Hieu Khac Le, Michael LeMay, Paria Moinzadeh, Lili Wang, Yong Yang, Dong Kun Noh, Tarek F. Abdelzaher, Carl A. Gunter, Jiawei Han, Xin Jin:
Diagnostic powertracing for sensor node failure analysis. IPSN 2010: 117-128
2000 – 2009
- 2009
- [c7]Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Jiawei Han, Hossein Ahmadi:
Finding Symbolic Bug Patterns in Sensor Networks. DCOSS 2009: 131-144 - 2008
- [c6]Mohammad Maifi Hasan Khan, Tarek F. Abdelzaher, Kamal Kant Gupta:
Towards Diagnostic Simulation in Sensor Networks. DCOSS 2008: 252-265 - [c5]Tarek F. Abdelzaher, Mohammad Maifi Hasan Khan, Hieu Khac Le, Hossein Ahmadi, Jiawei Han:
Data Mining for Diagnostic Debugging in Sensor Networks: Preliminary Evidence and Lessons Learned. KDD Workshop on Knowledge Discovery from Sensor Data 2008: 1-24 - [c4]Mohammad Maifi Hasan Khan, Hieu Khac Le, Hossein Ahmadi, Tarek F. Abdelzaher, Jiawei Han:
Dustminer: troubleshooting interactive complexity bugs in sensor networks. SenSys 2008: 99-112 - 2007
- [c3]Mohammad Maifi Hasan Khan, Liqian Luo, Chengdu Huang, Tarek F. Abdelzaher:
SNTS: Sensor Network Troubleshooting Suite. DCOSS 2007: 142-157 - [c2]Himanshu Khurana, Mohammad Maifi Hasan Khan, Von Welch:
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid. HICSS 2007: 115 - [c1]Tarek F. Abdelzaher, Qing Cao, Raghu K. Ganti, Dan Henriksson, Mohammad Maifi Hasan Khan, Jin Heo, Chengdu Huang, Praveen Jayachandran, Hieu Khac Le, Liqian Luo, Yu-En Tsai:
Towards a Layered Architecture for Object-Based Execution in Wide-Area Deeply Embedded Computing. ISORC 2007: 133-140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint